delete files of the laptop so that it cannot be receovered

i wish to delete my personal files from my laptop.
is there any software or any other way so that it cannot be recovered .
tomar_10Asked:
Who is Participating?
 
TheCobraSnakeConnect With a Mentor Commented:
There are indeed a lot of free programs available on the net.

This is freeware, so nothing to be paid ;-)

http://www.softdd.com/no-file-recovery/
0
 
Share-ITConnect With a Mentor Commented:
Google "Safe Delete" or suchlike and you'll find loads of tools.

Here's one for instance. http://www.downloadjunction.com/product/software/69104/index.html
0
 
jimtechCommented:
There are tons of software to do this on the market, I personally would recommend Norton's Government Wipe which goes through the process of deleting 7 times to be sure there is not a trace of anything left on the hard drive that can be recovered.
0
Easily Design & Build Your Next Website

Squarespace’s all-in-one platform gives you everything you need to express yourself creatively online, whether it is with a domain, website, or online store. Get started with your free trial today, and when ready, take 10% off your first purchase with offer code 'EXPERTS'.

 
CallandorConnect With a Mentor Commented:
I would recommend Active KillDisk http://www.killdisk.com/, which meets DoD 5220.22-M requirements.  Delete unwanted files and then run the Wipe facility.
0
 
souseranConnect With a Mentor Commented:
Eraser. Freeware. Uses the Guttmann (Default), Pseudorandom Data and US DoD 5220-22.M methods.

http://www.heidi.ie/node/6

If you want to completely wipe the drive, DBAN. Freeware.

http://dban.sourceforge.net

Create media from the .ISO. Boot to the media. At the prompt, type AUTONUKE. Walk away. When the black screen with the wipe results appears, you are ready to start from scratch with the drive.
0
 
PCBONEZCommented:
All of these solutions are good but bear in mind they leave you with a competely blank drive. You will have to reinstall your OS and all your software if you intend to use the drive again.
.
0
 
CallandorCommented:
>All of these solutions are good but bear in mind they leave you with a competely blank drive.

Not quite.  You can use the Wipe feature of KillDisk on the unused portion of your drive, so running it after erasing unwanted files should do the job.
0
 
souseranCommented:
>All of these solutions are good but bear in mind they leave you with a competely blank drive.

No. Eraser only wipes files or free space.

DBAN *will* "leave you with a completely blank drive." Eraser won't.
0
 
PCBONEZCommented:
> No. Eraser only wipes files or free space. <

Not according to their web page.
There might be some feature that wipes selected areas but it there is that method wouldn't be fully DoD 5220-22.M or Guttmann compliant.

I only mentioned it so the asker was aware everything might go *poof* if not careful.
-
No one mentioned that little detail and it's important if the asker has never done this before.

.
0
 
souseranCommented:
> Not according to their web page. <

According to their web site, there is more than "some feature that wipes selected areas." If you look at the Eraser Features, each of those lines represents a different capability within the program. That list does *not* mean that it is going to do *all* those things every time anyone uses it.

Eraser works with Windows 95, 98, ME, NT, 2000, XP (32/64),Vista (32/64), Windows Server 2003 and DOS.  It works with any drive including IDE, SCSI and RAID, and CD-RW's.

Among other things it:

1. Uses the Guttmann (Default), Pseudorandom Data and US DoD 5220-22.M methods.
2. Erases Files and Folders.
3. Erases Files/Folders that were only previously 'deleted'.

It can also erase "all hard drives using 'Darik's Boot and Nuke' method."

The tool *will* work for what the asker needs here. As someone who actually uses it, I can say that it's as easy as having them right-click on the files or folders they want to delete and selecting Erase from the Context menu. It's not guess-work and if the program is used with nothing more than the default settings, *nothing* is going to "go *poof*" except for the specific files or folders the user wants gone.

I never "mentioned that little detail" because, as someone who actually *uses* the program rather than someone who appears to be only reading about it, I can attest to the fact that there is *no* "little detail" to be taken into consideration here. With DBAN, yes, absolutely. With Eraser, no.

I invite and encourage you to actually *use* the program before making recommendations or suggestions about what it does/doesn't do and how it does/doesn't work.
0
 
PCBONEZCommented:
Perhaps you should go read what the Guttmann and DoD 5220-22.M  standards are.
They don't allow 'partially' wiping a hard drive.
They don't allow it because it's not considered secure.
-
Thanks but I'll stick to secure methods.
.
0
 
souseranCommented:
tomar_10,

If you want something that is not a software solution, try drive slagging:

http://driveslag.eecue.com/

Be advised that this will totally destroy the hard drive as well as any files, etc. The drive will not be usable, and you will need to replace the drive and start over with a brand new one. However, your files will be deleted in such a way as to be unrecoverable.

PCBONEZ,

Per Guttman himself:

In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques. As a result, they advocate applying the voodoo to PRML and EPRML drives even though it will have no more effect than a simple scrubbing with random data. In fact performing the full 35-pass overwrite is pointless for any drive since it targets a blend of scenarios involving all types of (normally-used) encoding technology, which covers everything back to 30+-year-old MFM methods (if you don't understand that statement, re-read the paper). If you're using a drive which uses encoding technology X, you only need to perform the passes specific to X, and you never need to perform all 35 passes. For any modern PRML/EPRML drive, a few passes of random scrubbing is the best you can do. As the paper says, "A good scrubbing with random data will do about as well as can be expected". This was true in 1996, and is still true now.

I'll stick with Eraser.

0
 
PCBONEZCommented:
"A good scrubbing with random data"
~IS~
Wiping the ~WHOLE DRIVE~ with random data.
- So thanks for illustrating and proving my point.

You don't understand what you are reading but go ahead and do whatever gives you a warm fuzzy.

.
0
 
CallandorCommented:
I don't think it is necessary to be a purist about this.  Most people do not have classified information on their hard drives that is worth millions of dollars and is worth using a scanning electron microscope on, nor do they need to spend inordinate efforts to secure a hard drive.  In the end, if one is paranoid about data security, one shouldn't let the drive be reused and just destroy it.  Otherwise, there is a level of "good enough" that is sufficient for most people, and we don't have to nitpick about it.  We're not talking about national security here, are we?
0
 
PCBONEZCommented:
Only the asker knows how much security is needed.

I don't think that warning to the asker that these programs will wipe the entire drive could be considered nitpicking. It's rather important.
The "this one doesn't" program does in fact also do that if used wrong.
That's also rather important.

.
0
 
CallandorCommented:
Well, that's a caveat I would say applies to any operation that could format your drive, modify partitions, or encrypt files and folders.
0
 
PCBONEZCommented:
Agreed but the asker didn't ask about those.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.